Title :
Security constraint processing during multilevel secure database design
Author_Institution :
Inst. of Stat. & Comput. Sci., Vienna Univ., Austria
fDate :
30 Nov-4 Dec 1992
Abstract :
By means of simple examples, a design technique for multilevel secure databases is proposed. The design activity covers the conceptual modeling and design phase and consists of the development of secure data schemata and secure function schemata. Data schemata represent the semantics and secrecy properties of data while function schemata describe processes and activities within the system. As security constraints defined on data or functions may influence each other, it argued that the design of a secure system must be data- as well as function-driven. Although the example chosen is quite simple, it is possible to express and model complex security relevant data semantics
Keywords :
database management systems; security of data; conceptual modeling; design phase; design technique; multilevel secure database design; secrecy properties; secure data schemata; secure function schemata; security constraints; security relevant data semantics; semantics; Computer science; Data models; Data security; Databases; Multilevel systems; Process design; Statistics;
Conference_Titel :
Computer Security Applications Conference, 1992. Proceedings., Eighth Annual
Conference_Location :
San Antonio, TX
Print_ISBN :
0-8186-3115-5
DOI :
10.1109/CSAC.1992.228231